{
    "id": "864dd1ac-92fe-3eb4-b3b4-1e473d3d161f",
    "name": "WebGoat",
    "slug": "webgoat",
    "status": "published",
    "lab_type": "pta",
    "is_sample": false,
    "duration_in_seconds": 1800,
    "metadata": {
        "courses": [
            "1dce1618-55b6-4205-9799-e509ad2b2c77",
            "c2e4c6a2-26ad-3af0-902a-9b0abc204219"
        ],
        "pta_sdn": "63",
        "collections": [
            "05dbc154-5745-4cfe-b23e-63fc4518bbc0"
        ],
        "pta_namespace": "attackdefenselabs",
        "learning_paths": [],
        "has_published_parent": true
    },
    "session": null,
    "company": "a491bc32-c056-4946-9169-cc053387bada",
    "created": "2022-03-17T11:44:43.168214Z",
    "modified": "2024-11-27T14:52:48.193569Z",
    "is_beta": false,
    "lab_objectives": [],
    "main_learning_area": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
    "learning_areas": [
        {
            "id": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
            "name": "Cyber Security",
            "slug": "cyber-security"
        }
    ],
    "categories": [
        {
            "id": "f77fc016-f53c-4170-a059-5b8931c71546",
            "name": "Deliberately Vulnerable"
        },
        {
            "id": "097ee8d8-9317-4b68-855f-cf7f8fa36edc",
            "name": "Web Apps"
        }
    ],
    "tags": [],
    "difficulty": "professional",
    "is_web_access": false,
    "is_lab_experience": true,
    "is_featured": false,
    "cve": null,
    "severity": null,
    "year": null,
    "classification": null,
    "is_trackable": false,
    "cpe_credits": null,
    "is_skill_check": false,
    "external_url": "",
    "solution_video": null,
    "explanation_video": null,
    "description": "[Webgoat](https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project) is a deliberately vulnerable web application maintained by [OWASP](https://www.owasp.org). It is licensed under [GPLv2](https://www.gnu.org/licenses/gpl-2.0.html).\n\n**[This lab can take over 2 minutes to load after opening the URL]**  \n\n\nYou can download Webgoat locally and install it in a virtual machine. We are providing an online version to save you time and pain of having to do that.\u00a0  \n\n\nA sample set of vulnerabilities include:  \n\n\n* Cross Site Scripting\n* Access Control Flaw\n* Buffer Overflow\n* Injection Flaw\n* Malicious Execution\n\nand many more.",
    "description_html": "<p><a href=\"https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project\">Webgoat</a> is a deliberately vulnerable web application maintained by <a href=\"https://www.owasp.org\">OWASP</a>. It is licensed under <a href=\"https://www.gnu.org/licenses/gpl-2.0.html\">GPLv2</a>.</p>\n<p><strong>[This lab can take over 2 minutes to load after opening the URL]</strong>  </p>\n<p>You can download Webgoat locally and install it in a virtual machine. We are providing an online version to save you time and pain of having to do that.\u00a0  </p>\n<p>A sample set of vulnerabilities include:  </p>\n<ul>\n<li>Cross Site Scripting</li>\n<li>Access Control Flaw</li>\n<li>Buffer Overflow</li>\n<li>Injection Flaw</li>\n<li>Malicious Execution</li>\n</ul>\n<p>and many more.</p>",
    "tasks": "",
    "tasks_html": "",
    "published_date": "2022-03-17T11:44:43.168214Z",
    "solutions": "",
    "solutions_html": "",
    "flags": [],
    "min_points_to_pass": null,
    "access_type": "default",
    "user_status": "unstarted",
    "user_lab_status": null,
    "user_status_modified": null,
    "user_flags": [],
    "global_running_session": null
}